Analysis
-
max time kernel
139s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
06-02-2025 02:24
Static task
static1
Behavioral task
behavioral1
Sample
97e8f14b68a589239b11630fd1405b0d2ce6b84c8338842ce9c82f0b344106d2.exe
Resource
win7-20240903-en
General
-
Target
97e8f14b68a589239b11630fd1405b0d2ce6b84c8338842ce9c82f0b344106d2.exe
-
Size
78KB
-
MD5
944a5f9694369ae5c5cbae402c559d29
-
SHA1
2594ce819effa70ba6d0a5393b7a3488b3880bbe
-
SHA256
97e8f14b68a589239b11630fd1405b0d2ce6b84c8338842ce9c82f0b344106d2
-
SHA512
af5e85a23a20f45754f4d9deff54b681fb9b89fbabe1050b546ddf35dc4de34aa0c0911c408510eea8cc4e4e8e2236b0e31f2e6d417ff0ace67f85c796b64c48
-
SSDEEP
768:+sc7OdswlhnuXLhUQW5NPUFLuFdxm9MGVGkno5ksPCvEHH18TUBB/IwRfCZU9/7P:+9MJjCL2VlddeykkPCv8CqO+fC2c0
Malware Config
Extracted
urelas
112.175.88.208
112.175.88.207
Signatures
-
Urelas family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-805940606-1861219160-370298170-1000\Control Panel\International\Geo\Nation 97e8f14b68a589239b11630fd1405b0d2ce6b84c8338842ce9c82f0b344106d2.exe -
Executes dropped EXE 1 IoCs
pid Process 1188 huter.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 97e8f14b68a589239b11630fd1405b0d2ce6b84c8338842ce9c82f0b344106d2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language huter.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2160 wrote to memory of 1188 2160 97e8f14b68a589239b11630fd1405b0d2ce6b84c8338842ce9c82f0b344106d2.exe 92 PID 2160 wrote to memory of 1188 2160 97e8f14b68a589239b11630fd1405b0d2ce6b84c8338842ce9c82f0b344106d2.exe 92 PID 2160 wrote to memory of 1188 2160 97e8f14b68a589239b11630fd1405b0d2ce6b84c8338842ce9c82f0b344106d2.exe 92 PID 2160 wrote to memory of 4700 2160 97e8f14b68a589239b11630fd1405b0d2ce6b84c8338842ce9c82f0b344106d2.exe 93 PID 2160 wrote to memory of 4700 2160 97e8f14b68a589239b11630fd1405b0d2ce6b84c8338842ce9c82f0b344106d2.exe 93 PID 2160 wrote to memory of 4700 2160 97e8f14b68a589239b11630fd1405b0d2ce6b84c8338842ce9c82f0b344106d2.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\97e8f14b68a589239b11630fd1405b0d2ce6b84c8338842ce9c82f0b344106d2.exe"C:\Users\Admin\AppData\Local\Temp\97e8f14b68a589239b11630fd1405b0d2ce6b84c8338842ce9c82f0b344106d2.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Users\Admin\AppData\Local\Temp\huter.exe"C:\Users\Admin\AppData\Local\Temp\huter.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1188
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\sanfdr.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:4700
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
512B
MD544618bd13e4f041a1726c9ae5825c84e
SHA1441d827a427d28451958c6fc92cdfd5043bf96d4
SHA256cfdd874d11a1179351acd3d28be1b54783c2caa22d74cc6db1a691c306be0a07
SHA512e0a68b861f2f12a398ca8ea90ddf6814f184185074887b4b1f75a154418c4e83ab556b73323d597d716be0e7314110fdc7b66fbc54f901a87e7fbb9784059e64
-
Filesize
78KB
MD55b0cf2645b2a3679e45c0d69632ebce3
SHA196cdc4b738ecfa795f6d67f0baf866088cb3b16b
SHA2568edb8e0be9437a88b93fa93c1018f1267fc56298162c54e1a9f9dc211620fc22
SHA51291374cc221a7105a4ea9e4fdb8a397a743184a7a0e7d931e8bccc8a818e32cc492ff0fb66852d85edb7a4d5a94a4301d2469f3b4afe429c80f4d1e8fdfa5c8c7
-
Filesize
338B
MD5b4072c554bec300641fc50d13bc38aad
SHA191508b035d7e1bb2f8e13be0de33272f286910fb
SHA25674e892e762e63ca8599eea04cf471bfc45e1c9aafef57f736780a7e3d07f666e
SHA51266c6f5700241902dd1bfd944707bcf79d89e237238fcfcfa5306348c5c0ea5d1560b74de4d97314390302151e0a644783dc247f69adc9652c8f0b35d45afa356